What are the three basic attributes of information security?
There are three basic attributes of information security: 1. Confidentiality, which refers to the characteristic that information is not leaked to or used by unauthorized individuals and entities; 2. Integrity, which refers to the fact that information is stored, It maintains the characteristics of not being modified, delayed, out of order, and not lost during the process of transmission and extraction; 3. Availability refers to the characteristics that information can be accessed by legitimate users and used in the required order.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Information security (information security) involves information theory, computer science, cryptography and other aspects of knowledge. It studies the protection methods of information in computer systems and communication networks. It refers to the generation, transmission, use, and During the storage process, security protection is provided for information carriers (processing carriers, storage carriers, transmission carriers) and information processing, transmission, storage, and access to prevent data information content or capabilities from being illegally used or tampered with.
The main information security threats include passive attacks, active attacks, insider attacks and distribution attacks. The main information security technologies include cryptography technology, identity management technology, rights management technology, local computing environment security technology, and firewall technology. etc., the development of information security has gone through stages such as communication confidentiality, computer security, information security and information assurance.
Three basic attributes of information security
1. Confidentiality
Information confidentiality Also known as information confidentiality, it refers to the characteristic that information is not disclosed to or used by unauthorized individuals and entities. Confidentiality of information varies with how many people the information is allowed to access.
The information that can be accessed by all personnel is public information, and the information that needs to be restricted is generally sensitive information or secrets. Secrets can be divided into different confidentiality levels according to the importance of the information or confidentiality requirements. For example, the state imposes restrictions on secret leaks. Depending on the impact (consequences) on national economic and security interests, national secrets are divided into three levels: A (secret level), B (confidential level) and C (top secret level).
Secrets cannot be leaked to unauthorized users or used illegally. Even if unauthorized users obtain the information, they cannot know the content of the information. Confidentiality usually uses access control to prevent unauthorized users from obtaining confidential information, and encryption technology to prevent unauthorized users from learning the information content.
2. Integrity
Integrity means that the information remains unmodified, delayed, out of order and unobstructed during the storage, transmission and retrieval process. Lost properties. Generally, access control is used to prevent tampering, and information digest algorithms are used to check whether the information has been tampered with. Integrity is the characteristic that data cannot be changed without authorization. Its purpose is to ensure that the data on the information system is in a complete and undamaged state.
3. Availability
Information availability refers to the characteristics that information can be accessed by legitimate users and can be used in the required order, that is, the required information can be obtained when needed. information. Availability is a measure of the reliability of information resource service functions and performance, and is a requirement for the overall reliability of the information system. At present, there is no particularly effective method to ensure that the system and network can provide normal services except for backup and redundant configuration.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What are the three basic attributes of information security?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Dreamweaver CS6
Visual web development tools

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1
Powerful PHP integrated development environment